joshterrill / node-reverse-trojan
An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.
☆16Updated 9 years ago
Alternatives and similar repositories for node-reverse-trojan:
Users that are interested in node-reverse-trojan are comparing it to the libraries listed below
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 5 months ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 4 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- AES encrypted python backdoor that communicates AES encrypted data☆9Updated 10 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- HTTP BOTNET☆8Updated 2 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- ☆26Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Random stuff☆16Updated 6 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆25Updated last year
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago